SYSTEM AND METHOD FOR PROCESSING VEHICLE EVENT DATA FOR LOW LATENCY SPEED ANALYSIS OF ROAD SEGMENTS

Information

  • Patent Application
  • 20210134147
  • Publication Number
    20210134147
  • Date Filed
    November 02, 2020
    4 years ago
  • Date Published
    May 06, 2021
    3 years ago
Abstract
Embodiments are directed to a system and methods for low latency processing of vehicle events to track vehicles through a road corridor comprising a plurality of road segments.
Description
BACKGROUND OF THE DISCLOSURE

The automotive industry is undergoing a radical change unlike anything seen before. Disruption is happening across the whole of the mobility ecosystem. The result is vehicles that are more automated, connected, electrified and shared. This gives rise to an explosion of car generated data. This rich new data asset remains largely untapped.


Vehicle location event data, such as GPS data, is extremely voluminous and can involve 200,000-400,000 records per second. The processing of location event data presents a challenge for conventional systems to provide substantially real-time analysis of the data, especially for individual vehicles. In particular, end user technology can require data packages. What is needed are system platforms and data processing algorithms and processes configured to process and store high-volume data with low latency while still making the high-volume data available for analysis and re-processing.


While there are systems for tracking vehicles, what is needed is virtually real-time and accurate trip and road information from high-volume vehicle data. What is needed is systems and algorithms configured to accurately identify journeys and journey destinations from vehicle movement and route analysis.


SUMMARY OF THE DISCLOSURE

The following briefly describes embodiments to provide a basic understanding of some aspects of the innovations described herein. This brief description is not intended as an extensive overview. It is not intended to identify key or critical elements, or to delineate or otherwise narrow the scope. Its purpose is merely to present some concepts in a simplified form as a prelude to the more detailed description that is presented later. An exemplary advantage of the systems and methods described herein is optimized low latency. For example, the systems and methods described in the present disclosure are capable of ingesting and processing vehicle event data for up to at least 600,000 records per second for up to 12 million vehicles.


In at least one embodiment, described is a system comprising a memory including program instructions and a processor configured to execute instructions for a method comprising:

    • generating a road corridor comprising at least three consecutive segments;
    • ingesting vehicle event data;
    • tracking, with the vehicle event data, a vehicle through one or more of the consecutive segments of the road corridor;
    • generating, for each of the one or more consecutive segments traversed by the vehicle, a segment event record comprising vehicle movement data derived from the vehicle event data; and
    • deleting the vehicle event data after the segment event record is generated.


In an embodiment, the processor can be configured to execute instructions for the method of generating the segment event record comprising:

    • a) identifying, from the vehicle event data, a qualifying data point for vehicle that has entered a first road segment;
    • b) identifying a traversal start data point in a second consecutive road segment;
    • c) tracking a plurality of data points in the second segment;
    • d) identifying the first data point in a third consecutive road segment as a segment event calculation trigger data point for the second road segment; and
    • e) generating the segment event record for the second road segment based on the plurality of data points from the second segment. The processor can be configured to execute instructions for the method further comprising: repeating steps (a)-(e) for each of one or more subsequent road segments of the road corridor, where the segment event calculation trigger data point for a prior road segment acts as a qualifying data point for the subsequent road segment.


In an embodiment, the vehicle movement data of the segment event record can comprise speed data for the vehicle. The processor can also be configured to execute instructions for the method further comprising: incrementing a speeding count for every data point where the vehicle event data shows the vehicle has gone above a speed threshold.


In an embodiment, the vehicle movement data of the segment event record can comprise a traversal time for the vehicle. The processor can be configured to execute instructions for the method further comprising: calculating a traversal time through the segment for the segment event record. Calculating the traversal time can comprise subtracting a captured time stamp of the traversal start data point from a captured time stamp of the calculation triggering data point.


In an embodiment, generating the segment event record comprises calculating an average speed for the vehicle through the segment for the segment event record. The average speed can be calculated by obtaining a traversal time and dividing a segment distance by the traversal time.


In an embodiment, the system can be configured to stop tracking the vehicle event data for a vehicle when an exception criterion is met. The exception criterion can comprise an exception criterion selected from the group of: a predetermined amount of time in which the system has not received vehicle event data for the tracked vehicle; a tracked vehicle returns to a previous segment; and a vehicle engine on/off event.


In an embodiment, the system can be configured to generate the segment event with an egress server; and output the generated segment event record via an egress interface of the egress server.


In an embodiment, described is a system comprising a memory including program instructions and a processor configured to execute instructions for a method, the method comprising:

    • ingesting location event data to a server; and
    • processing the location event data at the server to identify a road segment, wherein the processing comprises:
      • identifying the road segment;
      • tracking vehicle event data to locate a plurality of vehicle event data points for each of a plurality of vehicles in a road segment;
      • calculating a velocity for each of the plurality of vehicles;
      • calculating an average velocity for each vehicle through an arithmetic mean of the velocities of each of the plurality of vehicles through the road segment;
      • calculating a harmonic mean speed of the average vehicle velocities and a vehicle count for the road segment;
      • dividing a length L of segment by the harmonic mean speed to obtain a transit time for the road segment; and
      • outputting the transit time for the segment to a downstream interface.


The server performing the processing is can be an ingress server, an egress server, an analytics server, or a combination thereof.


In at least one embodiment, described is a method implemented by a computer including a processor, and a memory including program memory including instructions for executing the methods described above and herein.


In at least one embodiment, described is a computer program product including program memory including instructions which, when executed by processor, executes the methods described above and herein.





BRIEF DESCRIPTION OF THE DRAWINGS

Non-limiting and non-exhaustive embodiments are described with reference to the following drawings. In the drawings, like reference numerals refer to like parts throughout the various figures unless otherwise specified.


For a better understanding, reference will be made to the following Detailed Description, which is to be read in association with the accompanying drawings, wherein:



FIG. 1A is a system diagram of an environment in which at least one of the various embodiments can be implemented.



FIG. 1B illustrates a cloud computing architecture in accordance with at least one of the various embodiments.



FIG. 1C illustrates a logical architecture for a cloud computing platform in accordance with at least one of the various embodiments.



FIG. 2 shows a logical architecture and flowchart for an Ingress Server system in accordance with at least one of the various embodiments.



FIG. 3 shows a logical architecture and flowchart for a Stream Processing Server system in accordance with at least one of the various embodiments.



FIG. 4A represents a logical architecture and flowchart for an Egress Server system in accordance with at least one of the various embodiments.



FIG. 4B represents a flowchart for an Egress Server system in accordance with at least one of the various embodiments.



FIG. 4C is a diagram showing a logical layout for a road corridor comprising a plurality of road segments in accordance with at least one of the various embodiments.



FIG. 4D is a diagram showing a logical layout for a road corridor comprising a plurality of road segments in accordance with at least one of the various embodiments.



FIG. 4E shows an embodiment of a system flow for tracking a vehicle through a road corridor comprising a plurality of segments in accordance with at least one of the various embodiments.



FIG. 5 illustrates a logical architecture and flowchart for a process for an Analytics Server system in accordance with at least one of the various embodiments.



FIG. 6 illustrates a logical architecture and flowchart for a process for a Portal Server system in accordance with at least one of the various embodiments in accordance with at least one of the various embodiments.



FIG. 7 is a flowchart showing a data quality pipeline of data processing checks for the system in accordance with at least one of the various embodiments.



FIG. 8 is a flow chart and interface diagram for egressing a feed to an interface in accordance with at least one of the various embodiments.



FIG. 9 shows an embodiment of a system flow for determining accurate road speeds from vehicle event movement data points.





DETAILED DESCRIPTION OF THE EMBODIMENTS

Various embodiments now will be described more fully hereinafter with reference to the accompanying drawings, which form a part hereof, and which show, by way of illustration, specific embodiments by which the innovations described herein can be practiced. The embodiments can, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the embodiments to those skilled in the art. Among other things, the various embodiments can be methods, systems, media, or devices. The following detailed description is, therefore, not to be taken in a limiting sense.


Throughout the specification and claims, the following terms take the meanings explicitly associated herein, unless the context clearly dictates otherwise. The term “herein” refers to the specification, claims, and drawings associated with the current application. The phrase “in one embodiment” or “in an embodiment” as used herein does not necessarily refer to the same embodiment or a single embodiment, though it can. Furthermore, the phrase “in another embodiment” as used herein does not necessarily refer to a different embodiment, although it can. Thus, as described below, various embodiments can be readily combined, without departing from the scope or spirit of the present disclosure.


In addition, as used herein, the term “or” is an inclusive “or” operator, and is equivalent to the term “and/or” unless the context clearly dictates otherwise. The term “based on” is not exclusive and allows for being based on additional factors not described, unless the context clearly dictates otherwise. In addition, throughout the specification, the meaning of “a” “an” and “the” include plural references. The meaning of “in ” includes “in ” and “on.”


As used herein, the term “Host” can refer to an individual person, partnership, organization, or corporate entity that can own or operate one or more digital media properties (e.g., web sites, mobile applications, or the like). Hosts can arrange digital media properties to use hyper-local targeting by arranging the property to integrate with widget controllers or servers.


The following briefly describes various embodiments of a system, method, and computer program product for processing vehicle event data.


As used herein, a journey can include any trip, run, or travel to a destination.


Illustrative Logical System Architecture and System Flows


FIG. 1A is a logical architecture of system 10 for geolocation event processing and analytics in accordance with at least one embodiment. In at least one embodiment, Ingress Server system 100 can be arranged to be in communication with Stream Processing Server system 200 and Analytics Server system 500. The Stream Processing Server system 200 can be arranged to be in communication with Egress Server system 400 and Analytics Server system 500.


The Egress Server system 400 can be configured to be in communication with and provide data output to data consumers. The Egress Server system 400 can also be configured to be in communication with the Stream Processing Server 200.


The Analytics Server system 500 is configured to be in communication with and accept data from the Ingress Server system 100, the Stream Processing Server system 200, and the Egress Server system 400. The Analytics Server system 500 is configured to be in communication with and output data to a Portal Server system 600.


In at least one embodiment, Ingress Server system 100, Stream Processing Server system 200, Egress Server system 400, Analytics Server system 500, and Portal Server system 600 can each be one or more computers or servers. In at least one embodiment, one or more of Ingress Server system 100, Stream Processing Server system 200, Egress Server system 400, Analytics Server system 500, and Portal Server system 600 can be configured to operate on a single computer, for example a network server computer, or across multiple computers. For example, in at least one embodiment, the system 10 can be configured to run on a web services platform host such as Amazon Web Services (AWS) or Microsoft Azure. In an exemplary embodiment, the system 10 is configured on an AWS platform employing a Spark Streaming server, which can be configured to perform the data processing as described herein. In an embodiment, the system 10 can be configured to employ a high throughput messaging server, for example, Apache Kafka.


In at least one embodiment, Ingress Server system 100, Stream Processing Server system 200, Egress Server system 400, Analytics Server system 500, and Portal Server system 600 can be arranged to integrate and/or communicate using API's or other communication interfaces provided by the services.


In at least one embodiment, Ingress Server system 100, Stream Processing Server system 200, Egress Server system 400, Analytics Server system 500, and Portal Server system 600 can be hosted on Hosting Servers.


In at least one embodiment, Ingress Server system 100, Stream Processing Server system 200, Egress Server system 400, Analytics Server system 500, and Portal Server system 600 can be arranged to communicate directly or indirectly over a network to the client computers using one or more direct network paths including Wide Access Networks (WAN) or Local Access Networks (LAN).


As described herein, embodiments of the system 10, processes and algorithms can be configured to run on a web services platform host such as Amazon Web Services (AWS) ® or Microsoft Azure ®. A cloud computing architecture is configured for convenient, on-demand network access to a shared pool of configurable computing resources (e.g. networks, network bandwidth, servers, processing, memory, storage, applications, virtual machines, and services). A cloud computer platform can be configured to allow a platform provider to unilaterally provision computing capabilities, such as server time and network storage, as needed automatically without requiring human interaction with the service's provider. Further, cloud computing is available over a network and accessed through standard mechanisms that promote use by heterogeneous thin or thick client platforms (e.g., mobile phones, laptops, and PDAs). In a cloud computing architecture, a platform's computing resources can be pooled to serve multiple consumers, partners or other third party users using a multi-tenant model, with different physical and virtual resources dynamically assigned and reassigned according to demand A cloud computing architecture is also configured such that platform resources can be rapidly and elastically provisioned, in some cases automatically, to quickly scale out and rapidly released to quickly scale in.


Cloud computing systems can be configured with systems automatically control and optimize resource use by leveraging a metering capability at some level of abstraction appropriate to the type of service (e.g., storage, processing, bandwidth, and active user accounts). Resource usage can be monitored, controlled, and reported. As described herein, in embodiments, the system 10 is advantageously configured by the platform provider with innovative algorithms and database structures configured for low-latency.


A cloud computing architecture includes a number of service and platform configurations.


A Software as a Service (SaaS) is configured to allow a platform provider to use the provider's applications running on a cloud infrastructure. The applications are accessible from various client devices through a thin client interface such as a web browser (e.g., web-based e-mail) The consumer typically does not manage or control the underlying cloud infrastructure including network, servers, operating systems, storage, or even individual application capabilities, with the possible exception of limited user-specific application configuration settings.


A Platform as a Service (PaaS) is configured to allow a platform provider to deploy onto the cloud infrastructure consumer-created or acquired applications created using programming languages and tools supported by the provider. The consumer does not manage or control the underlying cloud infrastructure including networks, servers, operating systems, or storage, but can a have control over the deployed applications and possibly application hosting environment configurations.


An Infrastructure as a Service (IaaS) is configured to allow a platform provider to provision processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications. The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, deployed applications, and possibly limited control of select networking components (e.g., host firewalls).


A cloud computing architecture can be provided as a private cloud computing architecture, a community cloud computing architecture, or a public cloud computing architecture. A cloud computing architecture can also be configured as a hybrid cloud computing architecture comprising two or more clouds platforms (private, community, or public) that remain unique entities but are bound together by standardized or proprietary technology that enables data and application portability (e.g., cloud bursting for load-balancing between clouds).


A cloud computing environment is service oriented with a focus on statelessness, low coupling, modularity, and semantic interoperability. At the heart of cloud computing is an infrastructure comprising a network of interconnected nodes.


Referring now to FIG. 1B, an illustrative cloud computing environment 50 is depicted. As shown, cloud computing environment 50 comprises one or more cloud computing nodes 30 with which local computing devices used by cloud consumers, such as, for example, personal digital assistant (PDA) or cellular telephone 23, desktop computer 21, laptop computer 22, and event such as OEM vehicle sensor data source 14, application data source 16, telematics data source 20, wireless infrastructure data source 17, and third party data source 15 and/or automobile computer systems such as vehicle data source 12. Nodes 30 can communicate with one another. They can be grouped (not shown) physically or virtually, in one or more networks, such as private, community, public, or hybrid clouds as described herein, or a combination thereof. The cloud computing environment 50 is configured to offer infrastructure, platforms and/or software as services for which a cloud consumer does not need to maintain resources on a local computing device. It is understood that the types of computing devices shown in FIG. 1B are intended to be illustrative only and that computing nodes 30 and cloud computing environment 50 can communicate with any type of computerized device over any type of network and/or network addressable connection (e.g., using a web browser).


Referring now to FIG. 1C, a set of functional abstraction layers provided by cloud computing environment 50 (FIG. 1B) is shown. The components, layers, and functions shown in FIG. 1C are illustrative, and embodiments as described herein are not limited thereto. As depicted, the following layers and corresponding functions are provided:


A hardware and software layer 60 can comprise hardware and software components. Examples of hardware components include, for example mainframes 61; servers 62; servers 63; blade servers 64; storage devices 65; and networks and networking components 66. In some embodiments, software components include network application server software 67 and database software 68.


Virtualization layer 70 provides an abstraction layer from which the following examples of virtual entities can be provided: virtual servers 71; virtual storage 72; virtual networks 73, including virtual private networks; virtual applications and operating systems 74; and virtual clients 75.


In one example, management layer 80 can provide the functions described below. Resource provisioning 81 provides dynamic procurement of computing resources and other resources that are utilized to perform tasks within the cloud computing environment. Metering and Pricing 82 provide cost tracking as resources are utilized within the cloud computing environment, and billing or invoicing for consumption of these resources. In one example, these resources can comprise application software licenses. Security provides identity verification for cloud consumers and tasks, as well as protection for data and other resources. User portal 83 provides access to the cloud computing environment for consumers and system administrators. Service level management 84 provides cloud computing resource allocation and management so that required service levels are met. Service Level Agreement (SLA) planning and fulfillment 85 provides pre-arrangement for, and procurement of, cloud computing resources for which a future requirement is anticipated in accordance with an SLA.


Workloads layer 90 provides examples of functionality for which the cloud computing environment can be utilized. Examples of workloads and functions that can be provided from this layer include mapping and navigation 91; ingress processing 92, stream processing 93; portal dashboard delivery 94 same number; data analytics processing 95; and egress and data delivery 96.


Although this disclosure describes embodiments on a cloud computing platform, implementation of embodiments as described herein are not limited to a cloud computing environment.


One of ordinary skill in the art will appreciate that the architecture of system 10 is a non-limiting example that is illustrative of at least a portion of an embodiment. As such, more or less components can be employed and/or arranged differently without departing from the scope of the innovations described herein. However, system 10 is sufficient for disclosing at least the innovations claimed herein.


Referring to FIG. 2, a logical architecture for an Ingress Server system 100 for ingesting data and data throughput in accordance with at least one embodiment is shown. In at least one embodiment, events from one or more event sources can be determined In an embodiment, as shown in FIG. 1, event sources can include vehicle sensor data source 12, OEM vehicle sensor data source 14, application data source 16, telematics data source 20, wireless infrastructure data source 17, and third party data source 15 or the like. In at least one embodiment, the determined events can correspond to location data, vehicle sensor data, various user interactions, display operations, impressions, or the like, that can be managed by downstream components of the system, such as Stream Processing Server system 200 and Analytics Server system 500. In at least one embodiment, Ingress Server system 100 can ingress more or fewer event sources than shown in FIGS. 1A-2.


In at least one embodiment, events that can be received and/or determined from one or more event sources includes vehicle event data from one or more data sources, for example GPS devices, or location data tables provided by third party data source 15, such as OEM vehicle sensor data source 14. Vehicle event data can be ingested in database formats, for example, JSON, CSV, and XML. The vehicle event data can be ingested via APIs or other communication interfaces provided by the services and/or the Ingress Server system 100. For example, Ingress Server system 100 can offer an API Gateway 102 interface that integrates with an Ingress Server API 106 that enables Ingress Server system 100 to determine various events that can be associated with databases provided by the vehicle event source 14. An exemplary API gateway can include, for example AWS API Gateway. An exemplary hosting platform for an Ingress Server system 100 system can include Kubernetes and Docker, although other platforms and network computer configurations can be employed as well.


In at least one embodiment, the Ingress Server system 100 includes a Server 104 configured to accept raw data, for example, a Secure File Transfer Protocol Server (SFTP), an API, or other data inputs can be configured accept vehicle event data. The Ingress Server system 100 can be configured to store the raw data in data store 107 for further analysis, for example, by an Analytics Server system 500. Event data can include Ignition on, time stamp (T1 . . . TN), Ignition off, interesting event data, latitude and longitude, and Vehicle Information Number (VIN) information. Exemplary event data can include Vehicle Movement data from sources as known in the art, for example either from vehicles themselves (e.g. via GPS, API) or tables of location data provided from third party data sources 15.


In at least one embodiment, the Ingress Server system 100 is configured to clean and validate data. For example, the Ingress Server 100 can be configured include Ingress API 106 that can validate the ingested event and location data and pass the validated location data to a server queue 108, for example, an Apache Kafka queue, which is then outputted to the Stream Processing Server 200. The server 108 can be configured to output the validated ingressed location data to the data store 107 as well. The Ingress Server can also be configured pass invalid data to a data store 107. For example, invalid payloads can be stored in data store 107. Exemplary invalid data can include, for example, data with bad fields or unrecognized fields, or identical events.


In an embodiment, the system 10 is configured to detect and map vehicle locations with enhanced accuracy. In order to gather useful aggregates about the road network, for example expected traffic volumes and speeds across the daily/weekly cycle, the system 10 can be configured to determine how vehicles are moving through a given road network. As noted herein, a naive approach of associating or “snapping” each data point with a nearest section of a road can fail because vehicle GPS data has an inherent degree of error due to various known physical effects. Further, a road network often approaches and crosses itself in complicated geometries leading to locations with multiple road snapping candidates.


In an embodiment, the system 10 can be configured to include a base map given as a collection of line segments for road segments. The system 10 includes, for each line segment, geometrical information regarding the line segment's relation to its nearest neighbors. For each line segment, statistical information regarding expected traffic volumes and speeds is generated from an initial iteration of the process. As shown above, vehicle movement event data comprises longitude, latitude, heading, speed and time-of-day.


In an embodiment, the system 10 is configured to take a collection of line segments, which corresponds to road segments, and create an R-Tree index over the collection of line segments. R-trees are tree data structures used for spatial access methods, i.e., for indexing multi-dimensional information such as geographical coordinates, rectangles or polygons. The R-tree is configured to store spatial objects as bounding box polygons to represent, inter alia, road segments. The R-Tree is first used to find road segment candidates within a prescribed distance of a coordinate in order to snap a data point. The candidates are then further examined using a refined metric that considers event data such as the heading select a road segment, which is most likely based on all known information. Event data such as speed and/or time-of-day can also be employed to select a road segment.


The Ingress Server 100 can be configured to output the stored invalid data or allow stored data to be pulled to the Analysis Server 500 from the data store 107 for analysis, for example, to improve system performance For example, the Analysis Server 500 can be configured with diagnostic machine learning configured to perform analysis on databases of invalid data with unrecognized fields to newly identify and label fields for validated processing. The Ingress Server 100 can also be configured to pass stored ingressed location data for processing by the Analytics server 500, for example, for Journey analysis as described herein.


In an embodiment, the Ingress Server 100 is configured to process event data to derive vehicle movement data, for example speed, duration, and acceleration. For example, in an embodiment, a snapshot is taken on the event database every x number of seconds (e.g. 3 seconds). Lat/long data and time data can then be processed to derive vehicle tracking data, such as speed and acceleration, using vehicle position and time.


In an embodiment, the Ingress Server system 100 is configured to accept data from devices and third party platforms. The Ingress Server API 106 can be configured to authenticate devices and partner or third-party platforms and platform hosts to the system 10.


Accordingly, in an embodiment, the Ingress Server system 100 is configured to receive raw data and perform data quality checks for raw data and schema evaluation. Ingesting and validating raw data is the start of a data quality pipeline of quality checks for the system as shown in FIG. 7 at block 701. Table 1 shows an example of raw data that can be received into the system 10.














TABLE 1







Attribute
Type
Nullable
Description




















Raw
partner_id
Integer
No
Identifier for ingress partner


Data.
device_id
String
Yes
4-9 characters long



captured_timestamp
String
No
Time of an event, expressed in local






time with UTC offset



received_timestamp
String
No
Time event was received by Ingress






Server, UTC



longitude, latitude
Double
No
WGS84 coordinates of an event



speed
Float
No
Vehicle speed in kilometers per hour






recorded at the time of an event



additional
Map
No
Map of string key-value pairs to






express data attributes unique to each






ingress



joumey_id
String
No
An identifier for a journey and the






associated events within it



heading
Integer
Yes
Clockwise orientation of vehicle, 0






equals North



altitude
Integer
Yes
Elevation of vehicle as reported by






GPS



squish_vin
String
Yes
Encoded representation of vehicle






make/model characteristics



ignition_status
String
Yes
Indicator of whether vehicle is under






power









In another embodiment, vehicle event data from an ingress source can include less information. For example, as shown in Table 2, the raw vehicle event data can comprise a limited number of attributes, for example, location data (longitude and latitude) and time data (timestamps).














TABLE 2







Attribute
Type
Nullable
Description




















Raw
captured_timestamp
String
No
Time of an event, expressed in local


Data.



time with UTC offset



received_timestamp
String
No
Time event was received by Ingress






Server, UTC



longitude, latitude
Double
No
WGS84 coordinates of an event









An exemplary advantage of embodiments of the present disclosure is that information that is absent can be derived from innovative algorithms as described herein. For example, vehicle event data may not include a journey identification, or may have a journey identification that is inaccurate. Accordingly, the system 10 can be configured to derive additional vehicle event attribute data when the initially ingressed data has limited attributes. For example, the system 10 can be configured to identify a specific vehicle for ingressed vehicle event data and append a Vehicle ID or Device ID. The system 10 can thereby trace vehicle movement including starts and stops, speed, heading, acceleration, and other attributes using, for example, only location and timestamp data associated with a Vehicle ID or Device ID.


In an embodiment, at block 702, data received can conform to externally defined schema, for example, Avro or JSON. The data can be transformed into internal schema and validated. In an embodiment, event data can be validated against an agreed schema definition before being passed on to the messaging system for downstream processing by the data quality pipeline. For example, an Apache Avro schema definition can be employed before passing the validated data on to an Apache Kafka messaging system. In another embodiment, the raw movement and event data can also be processed by a client node cluster configuration, where each client is a consumer or producer, and clusters within an instance can replicate data amongst themselves.


For example, the Ingress server system 100 can be configured with a Pulsar Client connected to an Apache Pulsar end point for a Pulsar cluster. In an embodiment, the Apache Pulsar end point keeps track of the last data read, allowing an Apache Pulsar Client to connect at any time to pick up from the last data read. In Pulsar, a “standard” consumer interface involves using “consumer” clients to listen on topics, process incoming messages, and finally acknowledge those messages when the messages have been processed. Whenever a client connects to a topic, the client automatically begins reading from the earliest unacknowledged message onward because the topic's cursor is automatically managed by a Pulsar Broker module. However, a client reader interface for the client enables the client application to manage topic cursors in a bespoke manner For example, a Pulsar client reader can be configured to connect to a topic to specify which message the reader begins reading from when it connects to a topic. When connecting to a topic, the reader interface enables the client to begin with the earliest available message in the topic or the latest available message in the topic. The client reader can also be configured to begin at some other message between the earliest message and the latest message, for example by using a message ID to fetch messages from a persistent data store or cache.


As noted above, in at least one embodiment, the Ingress Server system 100 is configured to clean and validate data. For example, the Ingress Server system 100 can be configured include an Ingress Server API 106 that can validate the ingested vehicle event and location data and pass the validated location data to a server queue 108, for example, an Apache Kafka queue, which is then outputted to the Stream Processing Server system 200. Server 104 can be configured to output the validated ingressed location data to the data store 107 as well. The Ingress Server system 100 can also be configured to pass invalid data to a data store 107.


The map database can be, for example, a point of interest database or other map database, including public or proprietary map databases. Exemplary map databases can include extant street map data such as Geofabric for local street maps, or World Map Database. The system can be further configured to egress the data to external mapping interfaces, navigation interfaces, traffic interfaces, and connected car interfaces as described herein.


The Ingress Server system 100 can be configured to output the stored invalid data or allow stored data to be pulled to the Analysis Server system 500 from the data store 107 for analysis, for example, to improve system performance For example, the Analysis Server system 500 can be configured with diagnostic machine learning configured to perform analysis on databases of invalid data with unrecognized fields to newly identify and label fields for validated processing. The Ingress Server system 100 can also be configured to pass stored ingressed location data for processing by the Analytics Server system 500.


As described herein, the system 10 is configured to process data in both a streaming and a batch context. In the streaming context, low latency is more important than completeness, i.e. old data need not be processed, and in fact, processing old data can have a detrimental effect as it may hold up the processing of other, more recent data. In the batch context, completeness of data is more important than low latency. Accordingly, to facilitate the processing of data in these two contexts, in an embodiment, the system 10 can default to a streaming connection that ingresses all data as soon as it is available but can also be configured to skip old data. A batch processor can be configured to fill in any gaps left by the streaming processor due to old data.



FIG. 3 is a logical architecture for a Stream Processing Server system 200 for data throughput and analysis in accordance with at least one embodiment. Stream processing as described herein results in system processing improvements, including improvements in throughput in linear scaling of at least 200 k to 600 k records per second. Improvement further includes end-to-end system processing of 20 seconds, with further improvements to system latency being ongoing. In at least one embodiment, the system 10 can be configured to employ a server for micro-batch processing. For example, as described herein, in at least one embodiment, the Stream Processing Server system 200 can be configured to run on a web services platform host such as AWS employing a Spark Streaming server and a high throughput messaging server such as Apache Kafka. In an embodiment, the Stream Processing Server system 200 can include Device Management Server 207, for example, AWS Ignite, which can be configured input processed data from the data processing server. The Device Management Server 207 can be configured to use anonymized data for individual vehicle data analysis, which can be offered or interfaced externally. The system 10 can be configured to output data in real time, as well as to store data in one or more data stores for future analysis. For example, the Stream Processing Server system 200 can be configured to output real time data via an interface, for example Apache Kafka, to the Egress Server system 400. The Stream Processing Server system 200 can also be configured to store both real-time and batch data in the data store 107. The data in the data store 107 can be accessed or provided to the Insight Server system 500 for further analysis.


In at least one embodiment, event information can be stored in one or more data stores 107, for later processing and/or analysis Likewise, in at least one embodiment, event data and information can be processed as it is determined or received. Also, event payload and process information can be stored in data stores, such as data store 107, for use as historical information and/or comparison information and for further processing.


In at least one embodiment, the Stream Processing Server system 200 is configured to perform vehicle event data processing.



FIG. 3 illustrates a logical architecture and overview flowchart for a Steam Processing Server system 200 in accordance with at least one embodiment. At block 202, the Stream Processing Server system 200 performs validation of location event data from ingressed locations 201. Data that is not properly formatted, is duplicated, or is not recognized is filtered out. Exemplary invalid data can include, for example, data with bad fields, unrecognized fields, or identical events (duplicates) or engine on/engine e off data points occurring at the same place and time. The validation also includes a latency check, which discards event data that is older than a predetermined time period, for example, 7 seconds. In an embodiment, other latency filters can be employed, for example between 4 and 15 seconds.


In an embodiment, as shown at block 703 of FIG. 7, the Stream Processing Server system 200 is configured perform Attribute Bounds Filtering. Attribute Bounds Filtering checks to ensure event data attributes are within predefined bounds for the data that is meaningful for the data. For example, a heading attribute is defined as a circle (0→359). A squish-vin is a 9-10 character VIN. Examples include data that is predefined by a data provider or set by a standard. Data values not within these bounds indicate the data is inherently faulty for the Attribute. Non-conforming data can be checked and filtered out. An example of Attribute Bounds Filtering is given in Table 3.
















TABLE 3





Attribute





Data
Data


Bounds





Points
Points


Filtering

Attribute
Units
Defined by
Bounds
Flagged
Flagged (%)






















Values
Attributes
device_id
String
Externally
N/A
27
0.00171%


within
contain
longitude, latitude
Double
Internally
to spec
586
586


meaningful
only values
heading
Integer
Externally
0 → 359
94
0.00004%


range.
within
squish_vin
String
Externally
9-10
0
    0%



externally



characters



predefined



boundaries.









In an embodiment, at block 704 the system 10 is configured to perform Attribute Value Filtering. Attribute Value Filtering checks to ensure attribute values are internally set or bespoke defined ranges. For example, while a date of 1970 can pass an Attribute Bounds Filter check for a date Attribute of the event, the date is not a sensible value for vehicle tracking data. Accordingly, Attribute Value Filtering is configured to filter data older than a predefined time, for example 6 weeks or older, which can be checked and filtered. An example Attribute Bounds Filtering is given in Table 4.
















TABLE 4





Attribute





Data
Data


Value




Defined
Points
Points


Filtering

Attribute
Units
Defined by
Bounds
Flagged
Flagged (%)





















Values
Attributes
captured_timestamp
Timestamp

<6
64296


within
contain



weeks


reasonable
only values



ago


range.
within
received_timestamp
Timestamp

> now
0



internally
longitude, latitude
degrees
Internally
bounding
0



defined



box



boundaries.
Speed
kph
Internally
0 → 360
0




Altitude
metres
Internally
−1000 →







10000









At block 705, the system 10 can perform further validation on Attributes in a record to confirm that relationships between attributes of record data points are coherent. For example, a non-zero trip start event does not make logical sense for a Journey determination as described herein. Accordingly, as shown in Table 5, the system 10 can be configured to filter non-zero speed events recorded for the same Attributes for a captured timestamp and a received timestamp for a location as “TripStart” or Journey ignition on start event.













TABLE 5





Record-


Data
Data


Level


Points
Points


Filtering
Attributes
Conditions
Flagged
Flagged (%)



















Row
speed,
speed > 0 AND
439
0.0004%


contents
ignition_status
ignition_status IN


have

(‘KEY_OFF’, ‘KEY_ON’)


semantic
captured_timestamp,
received_timestamp <
41
0.00004%


meaning.
received_timestamp
captured_timestamp









Returning to FIG. 2, at block 204, in at least one embodiment, the Stream Processing Server 200 performs geohashing of the location event data. While alternatives to geohashing are available, such as an H3 algorithm as employed by Uber™, or a S2 algorithm as employed by Google™, it was found that geohashing provided exemplary improvements to the system 10, for example improvements to system latency and throughput. Geohashing also provided for database improvements in system 10 accuracy and vehicle detection. For example, employing a geohash to 9 characters of precision can allow a vehicle to be uniquely associated the geohash. Such precision can be employed in Journey determination algorithms as described herein. In at least one embodiment, the location data in the event data is encoded to a proximity, the encoding comprising geohashing latitude and longitude for each event to a proximity for each event. The event data comprises time, position (lat/long), and event of interest data. Event of interest data can include harsh brake and harsh acceleration. For example, a harsh brake can be defined as a deceleration in a predetermined period of time (e.g. 40-0 in x seconds), and a harsh acceleration is defined as an acceleration in a predetermined period of time (e.g. 40-80 mph in x seconds). Event of interest data can be correlated and processed for employment in other algorithms For example, a cluster of harsh brakes mapped in location to a spatiotemporal cluster can be employed as a congestion detection algorithm.


The geohashing algorithm encodes latitude and longitude (lat/long) data from event data to a short string of n characters. In an embodiment, the geohashed lat/long data is geohashed to a shape. For example, in an embodiment, the lat/long data can be geohashed to a rectangle whose edges are proportional to the characters in the string. In an embodiment, the geohash can be encoded from to 4 to 9 characters.


A number of advantages flow from employing geohashed event data as described herein. For example, in a database, data indexed by geohash will have all points for a given rectangular area in contiguous slices, where the number of slices is determined by the geohash precision of encoding. This improves the database by allowing queries on a single index, which is much easier or faster than multiple-index queries. The geohash index structure is also useful for streamlined proximity searching, as the closest points are often among the closest geohashes.


At block 206, in at least one embodiment, the Stream Processing Server system 200 performs a location lookup. As noted above, in an embodiment, the system 10 can be configured to encode the geohash to identify a defined geographical area, for example, a country, a state, or a zip code. The system 10 can geohash the lat/long to a rectangle whose edges are proportional to the characters in the string.


For example, in an embodiment, the geohashing can be configured to encode the geohash to 5 characters, and the system 10 can be configured to identify a state to the 5-character geohashed location. For example, the geohash encoded to 5 slices or characters of precision is accurate to +/−2.5 kilometers, which is sufficient to identify a state. A geohash to 6 characters can be used to identify the geohashed location to a zip code, as it is accurate to +/−0.61 kilometers. A geohash to 4 characters can be used to identify a country. In an embodiment, the system 10 can be configured to encode the geohash to uniquely identify a vehicle with the geohashed location. In an embodiment, the system 10 can be configured to encode the geohash to 9 characters to uniquely identify a vehicle.


In an embodiment, the system 10 can be further configured to map the geohashed event data to a map database. The map database can be, for example, a point of interest database or other map database, including public or proprietary map databases as described herein. The system 10 can be further configured to produce mapping interfaces. An exemplary advantage of employing geohashing as described herein is that it allows for much faster, low latency enrichment of the vehicle event data when processed downstream. For example, geographical definitions, map data, and other enrichments are easily mapped to geohashed locations and Vehicle IDs. Feed data can be also be combined into an aggregated data set and visualized using an interface, for example a GIS visualization tool (e.g.: Mapbox, CARTO, ArcGIS, or Google Maps API) as shown in FIG. 8 or other interfaces to produce and interface graphic reports or to output reports to third parties 15 using the data processed to produce the analytics insights, for example, via the Egress Server system 400 or Portal Server system 600.


In at least one embodiment, at block 208, the Stream Processor Server system 200 can be configured to anonymize the data to remove identifying information, for example, by removing or obscuring personally identifying information from a Vehicle Identification Number (VIN) for vehicle data in the event data. In various embodiments, event data or other data can include VIN numbers, which include numbers representing product information for the vehicle, such as make, model, and year, and also includes characters that uniquely identify the vehicle, and can be used to personally identify it to an owner. The system 10 can include, for example, an algorithm that removes the characters in the VIN that uniquely identify a vehicle from vehicle data but leaves other identifying serial numbers (e.g. for make, model and year), for example, a Squish Vin algorithm In an embodiment, the system 10 can be configured to add a unique vehicle tag to the anonymized data. For example, the system 10 can be configured to add unique numbers, characters, or other identifying information to anonymized data so the event data for a unique vehicle can be tracked, processed and analyzed after the personally identifying information associated with the VIN has been removed. An exemplary advantage of anonymized data is that the anonymized data allows processed event data to be provided externally while still protecting personally identifying information from the data, for example as may be legally required or as may be desired by users.


In at least one embodiment, as described herein, a geohash to 9 characters can also provide unique identification of a vehicle without obtaining or needing personally identifying information such as VIN data. Vehicles can be identified via processing a database event data and geohashed to a sufficient precision to identify unique vehicles, for example to 9 characters, and the vehicle can then be identified, tracked, and their data processed as described herein.


In an embodiment, data can be processed as described herein. For example, un-aggregated data can be stored in a database (e.g. Parquet) and partitioned by time. Data can be validated in-stream and then reverse geocoded in-stream. Data enrichment, for example by vehicle type, can be performed in-stream. The vehicle event data can aggregated, for example, by region, by journey, and by date. The data can be stored in Parquet, and can also be stored in Postgres. Reference data can be applied in Parquet for in-stream merges. Other reference data can be applied in Postgres for spatial attributes.


As noted above, for real-time streaming, at block 202, the data validation filters out data that has excess latency, for example a latency over 7 seconds. However, batch data processing can run with a full set of data without gaps, and thus can include data that is not filtered for latency. For example, a batch data process for analytics as described with respect to FIG. 5 can be configured to accept data up to 6 weeks old, whereas the streaming stack of Stream Processing Server system 200 is configured to filter data that is over 7 seconds old, and thus includes the latency validation check at block 202 and rejects events with higher latency.


In an embodiment, at block 212, both the transformed location data filtered for latency and the rejected latency data are input to a server queue, for example, an Apache Kafka queue. At block 214, the Stream Processing server system 200 can split the data into a data set including full data 216—the transformed location data filtered for latency and the rejected latency data—and another data set of the transformed location data 222. The full data 216 is stored in data store 107 for access or delivery to the Analytics Server system 500, while the filtered transformed location data is delivered to the Egress Server system 400. In another embodiment, the full data set or portions thereof including the rejected data can also be delivered to the Egress Server system 400 for third party platforms for their own use and analysis. In such an embodiment, at block 213 transformed location data filtered for latency and the rejected latency data can be provided directly to the Egress Server system 400.



FIG. 4A is a logical architecture for an Egress Server system 400. In at least one embodiment, Egress Server system 400 can be one or more computers arranged to ingest, throughput records, and output event data. The Egress Server system 400 can be configured to provide data on a push or pull basis. For example, in an embodiment, the system 10 can be configured to employ a server Push server from an Apache Spark Cluster or a distributed server system for parallel processing via multiple nodes, for example a Scala or Java platform on an Akka Server Platform. The push server can be configured to process transformed location data from the Stream Process Server system 200, for example, for latency filtering 421, geo filtering 422, event filtering 423, transformation 424, and transmission 425. As described herein, geohashing improves system 10 throughput latency considerably, which allows for advantages in timely push notification for data processed in close proximity to events, for example within minutes and even seconds. For example, in an embodiment, the system 10 is configured to target under 60 seconds of latency. As noted above, Stream Processing Server system 200 is configured to filter events with a latency of less than 7 seconds, also improving throughput. In an embodiment, a data store 406 for pull data can be provided via an API gateway 404, and a Pull API 405 can track which third party 15 users are pulling data and what data users are asking for.


For example, in an embodiment, the Egress Server system 400 can provide pattern data based on filters provided by the system 10. For example, the system 10 can be configured to provide a geofence filter 412 to filter event data for a given location or locations. As will be appreciated, geofencing can be configured to bound and process journey and event data as described herein for numerous patterns and configurations. For example, in an embodiment, the Egress Server system 400 can be configured to provide a “Parking” filter configured restrict the data to the start and end of journey (Ignition key on/off events) within the longitude/latitudes provided or selected by a user. Further filters or exceptions for this data can be configured, for example by state (state code or lat/long). The system 10 can also be configured with a “Traffic” filter to provide traffic pattern data, for example, with given states and lat/long bounding boxes excluded from the filters.


In an embodiment, the Egress Server 400 can be configured to process data with low-latency algorithms configured to maintain and improve low latency real-time throughput. The algorithms can be configured to process the data for low-latency file output that can populate downstream interfaces requiring targeted, real-time data that does not clog computational resources or render them inoperable. In an embodiment, the system 10 is configured to provide low latency average road speed data for road segments for output in virtually real time from a live vehicle movement data stream from the Stream Processing Server 200. The Egress Server 400 can also be configured to delete raw data in order and provide lightweight data packages to partners 20 and configured for downstream interfaces, for example via the Push Server.


As shown in FIG. 4B, in an embodiment, at block 408 the Egress Server 400 is configured with a road corridor comprising the road segments of interest and entry and exit segments defined by a set of consecutive polygons as described herein. The system also includes a speed threshold for each segment. At block 410, the system is configured to ingest high throughput real time vehicle movement event data, which includes standard trip event data ingressed by the Ingress Server 100 and processed by the Stream Processing Server 300, which includes data such as a device ID, lat/long, ignition status, speed, and a time stamp.


In an embodiment, at block 412 the system is configured to track data points for a vehicle as described herein with respect to FIGS. 4B-4E. The system is configured to provide, per vehicle, from a vehicle movement event data stream: a traversal time per vehicle across a road segment, an average speed per vehicle across a road segment; and a number of times a data point was received for a vehicle that was above a speed threshold for a road segment. In an embodiment, the interval between data points being captured from the vehicle can be, for example, 1-3 seconds.



FIGS. 4C-4D are diagrams showing a logical layout for a road corridor comprising a plurality of road segments. A road corridor is a part of a road where traffic is monitored. In an embodiment, a road segment can be defined by a polygon drawn around a given section of road. A polygon can be defined as three or more points that make up a two dimensional shape around the section. A data point as used herein refers to a point denoted by a latitude and a longitude and the vehicle event data for that point. A road corridor comprises a number (n) of road segments of interest and an additional entry segment and exit segment. Accordingly, a road corridor is a series of consecutive road segments including at least 3 segments. As described below, at least three consecutive segments are employed to obtain vehicle data for a given segment when a vehicle traverses the segment.


In an example shown and described with reference to FIGS. 4C-4D, each of the road segments is 1531.06 yards as driven down the center of the road. The road corridor comprises 11 segments, and the total length for the road corridor (all segments) is 16841.66 yards or approximately 9.57 miles. However, the corridor can include any number at or above the three or more road segments, and the segments of the road corridor can be defined to be variable lengths.


Each road segment comprises a speed threshold. Speed thresholds are defined per segment, so each segment can have a different speed threshold. The speed threshold is configured as a threshold for counting data points where the vehicle speed is above the threshold. A speed threshold could be defined to correspond, for example, to posted speed limits for the road the segment corresponds to, though it need not be so defined. A speed threshold can be set for any speed, and thus defined to capture speed data for any purpose.


The system is configured to calculate at segment traversal for a vehicle by monitoring a plurality of data points from the vehicle event data. A segment traversal is when a vehicle passes all the way through a road segment from one end to the other.


In an embodiment, as shown in FIG. 4D, at point A, the system records the vehicle event data for a specific Device ID when a vehicle is first identified in a segment 1. Point B is a traversal start data point, where the vehicle first identified at point A has crossed into segment 2. The event data at point A is thus a qualifying point that allows the system to qualify the vehicle as crossing the boundary from segment 1 into segment 2 at point B. At point B, the system establishes a vehicle state for the vehicle. Point B is used as the start point for the calculations, as the system confirms the vehicle crossed the boundary and has entered segment 2.


At any point where a vehicle speed crosses a speed threshold, the system is configured to increment a speeding count for the vehicle for that point. As shown in FIG. 4D, at point C, the vehicle is still in segment 2 and goes above the speed threshold. The system increments speeding count to 1 for that vehicle. At point D, the system records that the vehicle is still in segment 2 and is not speeding. At point E the system records that the vehicle is still in segment 2 and crosses the speed threshold again. The system increments the vehicle's speeding count to 2. At point F, the system identifies that the vehicle has left segment 2 and has crossed into segment 3. Point E is also a qualifying data point for segment 3. Thus, the system identifies that the vehicle has completed a segment traversal of segment 2. Point F thus acts as a trigger point for triggering calculations for segment 2.


At calculation triggering data point F, the system then calculates data for a segment event record for segment 2. The segment event record includes a traversal time and average speed for segment 2. A traversal time is the amount of time taken for a segment traversal. Traversal time is the captured time stamp of the first data point exiting outside the road segment minus the captured time stamp of the first data point inside the road segment in milliseconds. For example, in FIG. 4D, the traversal time for segment 2 is calculated as the time stamp at point F (the first data point exiting outside road segment 2) minus the time stamp for the traversal at point B (the first data point inside road segment 2).


Average speed is the segment distance divided by the traversal time. The average speed can be multiplied to obtain a desired order of magnitude. For a given capture rate for vehicle movement data points (e.g., 3 seconds), the exact distance driven will vary by record, and a fixed distance can be used when calculating average speed through the segment. For example, at 50 MPH a vehicle will have travelled approximately 73.3 yards in 3 seconds. In the example shown in FIGS. 4C-4D the segment distance 1531.06 yards is divided by (Traversal Time multiplied by 3600000) divided by 1760 to obtain an average speed in MPH accurate to 2 decimal places.


A worked example for a segment event record as shown in FIG. 4D is as follows: a vehicle enters the road segment at 12:00:00.342 having been seen in the previous segment (segment 1). The vehicle is identified is seen at 12:01:30.342 in the following road segment (segment 2). The traversal time is 12:01:30.342−12:00:00.342=90000 milliseconds. The average speed is ((1531.06/90000)*3600000)/1760 =34.80MPH. The system also generates a segment event record for segment 2 that includes a speeding count of 2.


Returning to FIG. 4B, at block 414, each time a vehicle completes a full segment (by entering from a previous segment and exiting into the next segment) a segment event record is generated. The segment event record comprises a Data Point ID, which is a unique ID to allow the system to internally audit against the individual data point that created the segment event. Accordingly, each segment event record has a Data Point ID to uniquely identify the segment record. The segment event record also includes a Segment ID, which is a unique ID for the segment. The segment event record also includes a Traversal Time, which is the time taken to traverse the segment in milliseconds, and an Average Speed, which is the average speed through the segment in MPH. Finally, the segment event record includes an Above Speed Threshold Count, which is the number of times the vehicle was above the speed threshold through the segment. In an embodiment, the segment event record can be generated in a JSON format At block 418, each segment event record is generated and transmitted and partitioned on a per segment basis. In an embodiment, transmitted files can contain one or more segment event records within a payload array. In an embodiment, if no vehicle passes through a segment, no file is generated. An exemplary logical payload for a segment event record is shown in Table 6.












TABLE 6





Attribute Name
Type
Description
Example







Id
String
Unique identifier for the derived
123e4567-e89b-12d3-




record
a456-556642440000


Segment ID
Number
Unique identifier for the segment
1


Traversal Time
Number
The time it took to traverse the
930000




road segment in milliseconds


Average Speed
Decimal
The average speed across the
50.56




road segment in MPH


Above Speed
Number
The number of data points within
6


Threshold

the road segment where the speed


Count

was above the speed threshold









As shown in FIG. 4C, where a road corridor has another segment (e.g.: segment 3) after a segment event record is calculated (e.g. for segment 2), point F is also a traversal start data point for that segment, which is qualified by point E. The system is thus configured to track the vehicle state purposes of generating another segment event record, but can discard raw data used to calculate the prior segment (segment 2) after the segment event record is generated. This process is repeated for each consecutive segment until the vehicle leaves any segment of the road corridor or meets one of the exception criteria as described below.


As shown in FIG. 4B, in an embodiment, at block 418 the system is configured to delete vehicle movement event data for a data point after a vehicle state is established and the speeding count and time stamp is recorded in a segment event record. Once the system establishes the state of the vehicle at point B after the vehicle is qualified at point A as shown in FIG. 4C, the system employs the Data Point ID to track the vehicle through the segment. As each point is identified and its speed count calculated, the system no longer needs to retain the raw event data for the point. As such, once the segment event record is created, the Egress Server 400 is configured to delete the raw data, to improve the latency of the system.


As explained herein, improved latency is not incidental to the design and implementation of the algorithm and segment event record container employed to egress segment events, as low latency is an important technical feature of the system. Further, light segment event record containers allow downstream consoles, for example traffic management consoles, to operate. For example, at block 416 of FIG. 4B, segment event records can be transmitted in real time to external partners 20 from the push server. For example, in an embodiment the segment record can be configured to be delivered from the push server to an interface such as an AWS S3 bucket, web sockets, or an API. In an embodiment, segment event records can be transmitted to the analytics server 500 for insight processing and output to the portal server 600 for APIs or other interfaces. Thus, at block 418 the system can be configured to discard the raw data used at the Egress Server 400 to improve both the system's own latency and the operability downstream interfaces and consoles.


As shown in the example above, at least three consecutive segments are employed to calculate an average speed for a given segment. FIG. 4E shows an embodiment of a system flow for tracking a vehicle through a road corridor comprising a plurality of segments, including an initial, entry segment and an exit segment. At block 430, a first segment qualifies a vehicle, when it is first identified by the system. In the segment in which a vehicle is first identified, it cannot be determined if the vehicle entered the segment at a traversal boundary. At block 432, once the system identifies that the vehicle is in a second segment, the system confirms that the vehicle that appeared in the first segment crossed the boundary between the first and second segments. Then vehicle state is thus established and tracked through the segment. At block 434, the vehicle is tracked as entering the third segment from the second segment and the system confirms that the vehicle has traversed the entire second segment. At block 435, the system calculates the data for the segment event record as described herein and creates the segment event. At step 436, this process repeats for each consecutive segment of the road corridor until block 438, when the vehicle exits the road corridor or leaves a given segment within the road corridor. When the vehicle is outside the road corridor, at block 540 the vehicle tracking ends.


In an embodiment, the system is configured to end vehicle tracking for a number of exceptions. As shown at block 431, in an embodiment, the system is configured to stop tracking vehicle event data if the system has not received a data point for that vehicle in 30 minutes. In this case, the system proceeds to block 440 and stops tracking that vehicle.


At block 433, the system is also configured to delete or ignore a vehicle that returns to a previous segment (i.e. a U-turn). In this case, the system proceeds to block 440 and stops tracking that vehicle.


In an embodiment, at block 437 and block 439, if the event data includes and engine on or and engine off event, the road segment data for that segment is deleted. The presence of an engine on/off event signals that there was a loss of connectivity when a vehicle stopped in the segment. In this case, the system again proceeds to block 440 and stops tracking that vehicle.


As will be appreciated, the system 10 provides extremely accurate insights at low latency, and can account for variation and possible bias of vehicles, additionally ensuring that edge cases do not introduce bias. Edge cases include: late or out of order data, wide variations of speed due to multi-lane interstates, and low volume vehicles that skew results.



FIG. 5 represents a logical architecture for an Analytics Server system 500 for data analytics and insight. In at least one embodiment, Analytics Server system 500 can be one or more computers arranged to analyze event data. Both real-time and batch data can be passed to the Analytics Server system 500 for processing from other components as described herein. In an embodiment, a cluster computing framework and batch processor, such as an Apache Spark cluster, which combines batch and streaming data processing, can be employed by the Analytics Server system 500. Data provided to the Analytics Server system 500 can include, for example, data from the Ingress Server system 100, the Stream Processing Server system 200, and the Egress Server system 400.


In an embodiment, the Analytics Server system 500 can be configured to accept vehicle event payload and processed information, which can be stored in data stores, such as data stores 107. As shown in FIG. 5, the storage includes real-time egressed data from the Egress Server system 400, transformed location data and reject data from the Stream Processing Server system 200, and batch and real-time, raw data from the Ingress Server system 100. As shown in FIG. 2, ingressed locations stored in the data store 107 can be output or pulled into the Analytics Server system 500. The Analytics Server system 500 can be configured to process the ingressed location data in the same way as the Stream Processor Server system 200 as shown in FIG. 2. As noted above, the Stream Processing Server system 200 can be configured to split the data into a full data set 216 including full data (transformed location data filtered for latency and the rejected latency data) and a data set of transformed location data 222. The full data set 216 is stored in data store 107 for access or delivery to the Analytics Server system 500, while the filtered transformed location data is delivered to the Egress Server system 400. As shown in FIG. 5, real time filtered data can be processed for reporting in near real time, including reports for performance 522, Ingress vs. Egress 524, operational monitoring 526, and alerts 528.


Accordingly, at block 502 of FIG. 5, in at least one embodiment, the Analytics Processing Server system 500 can be configured to optionally perform validation of raw location event data from ingressed locations in the same manner as shown with block 202 in FIG. 2 and blocks 701-705 of FIG. 7. In an embodiment, as shown in FIG. 7, at block 706, the system 10 can employ batch processing of records to perform further validation on Attributes for multiple event records to confirm that intra-record relationships between attributes of event data points are meaningful. For example, as shown in Table 7, the system 10 can be configured to analyze data points analyzed to ensure logical ordering of events for a journey (e.g.: journey events for a journey alternate “TripStart-TripEnd-TripStart” and do not repeat “TripStart-TripStart-TripEnd-TripEnd).













TABLE 7





Intra-


Data
Data


Record


Points
Points


Filtering
Attributes
Conditions
Flagged
Flagged (%)







Record
ignition_status
LEAD(ignition_status) =
9125
0.0035%


ordering

ignition_status AND


logical.

ignition_status < >




‘MID_JOURNEY’









Referring to block 504 of FIG. 5, in at least one embodiment, the Analytics Server system 500 can optionally be configured to perform geohashing of the location event data as shown in FIG. 2, block 204. At block 506 of FIG. 5, the Analytics Server system 500 can optionally perform location lookup. At block 508 of FIG. 5, the Analytics Server system 500 can be configured to optionally perform device anonymization as shown in blocks 206 and 208 of FIG. 2.


At block 510, in at least one embodiment, the Analytics Server 500 can perform a Journey Segmentation analysis of the event data. At block 512, the Analytics Sever 500 is configured to perform calculations to qualify a Journey from event information. In at least one embodiment, at block 514, the system is configured to provide active vehicle detection by analyzing a database of vehicle event data and the summarizing of a journey of points into a Journey object with attributes such as start time, end time, start location, end location, data point count, average interval and the like. In an embodiment, Journey objects can be put into a separate data table for processing.


In an exemplary embodiment, the system 10 can be configured to perform vehicle tracking without the need for pre-identification of the vehicle (e.g. by a VIN number). As described above, geohashing can be employed on a database of event data to geohash data to a precision of 9 characters, which corresponds to a shape sufficient to uniquely correlate the event to a vehicle. In an embodiment, the active vehicle detection comprises identifying a vehicle path from a plurality of the events over a period of time. In an embodiment, the active vehicle detection can comprise identifying the vehicle path from the plurality of events over the period of a day (24 hours). The identification comprises using, for example, a connected components algorithm In an embodiment, the connected components algorithm is employed to identify a vehicle path in a directed graph including the day of vehicle events, in which in the graph, a node is a vehicle and a connection between nodes is the identified vehicle path. For example, a graph of journey starts and journey ends is created, where nodes represent starts and ends, and edges are journeys undertaken by a vehicle. At each edge, starts and ends are sorted temporally. Edges are created to connect ends to the next start at that node, ordered by time. Nodes are 9 digit geohashes of GPS coordinates. A connected components algorithm finds the set of nodes and edges that are connected and, a generated device ID at the start of a day is passed along the determined subgraph to uniquely identify the journeys (edges) as being undertaken by the same vehicle.


An exemplary advantage of this approach is it obviates the need for pre-identification of vehicles to event data. Journey Segments from vehicle paths meeting Journey criteria as described herein can be employed to detect Journeys and exclude non-qualifying Journey events as described above. For example, a geohash encoded to 9 digits (highest resolution) for event data showing a vehicle had a stop movement/engine e off to start movement/engine e on event within x seconds of each other (30 seconds) can be deemed the same vehicle for a Journey. For a sequence of arrives and leaves, a Journey can be calculated as the shortest path of Journey Segments through the graph.


In at least one embodiment, at block 515, the system 10 can be configured to store the event data and Journey determination data in a data warehouse 517. Data can be stored in a database format In an embodiment, a time column can be added to the processed data. In an embodiment, the database can also comprise Point of Interest (POI) data.


The Analytics Server system 500 can include an analytics server component 516 to perform data analysis on data stored in the data warehouse 517, for example a Spark analytics cluster. The Analytics Server system 500 can be configured to perform evaluation 530, clustering 531, demographic analysis 532, and bespoke analysis 533. For example, a date column and hour column can be added to data to processed Journey data and location data stored in the warehouse 517. This can be employed for bespoke analysis 533, for example, determining how many vehicles at intersection x by date and time. The system 10 can also be configured to provide bespoke analysis 533 at the Egress Server system 400, as described with respect to FIG. 4A.


In an embodiment, a geospatial index row can be added to stored warehouse 517 data, for example, to perform hyper local targeting or speeding up ad hoc queries on geohashed data. For example, location data resolved to 4 decimals or characters can correspond to a resolution of 20 meters or under. The Analytics Server 500 can be configured with diagnostic machine learning configured to perform analysis on databases of invalid data with unrecognized fields to newly identify and label fields for validated processing.


In an embodiment, the system 10 can be configured to process vehicle event data to provide enhanced insights and efficient processing. Exemplary processes and systems for processing event data comprise:

    • K nearest neighbors over an R-Tree with graph local searching and custom metrics for performing snapping of data points to roads;
    • DBSCAN with custom metrics for finding areas of parking related to points of interest;
    • XGBoost for classification of journey purpose with a classifier modified from one built over National Household Travel Survey data;
    • Levenshtein and Soundex for street address matching;
    • ARIMA for traffic volume time series forecasting;
    • Cross correlation and dynamic time warping for determination of road co-dependency;
    • Facebook Prophet for datapoint volume forecasting;
    • Gaussian Mixture Model for identifying traffic congestion state; and
    • XmR for anomaly detection control charting.


The Analytics Server system 500 can be configured to perform road snapping as described with respect to the Ingress Server system 100 hereinabove. The algorithm as described above advantageously can use individual points for snapping, and extracts as much information as possible from each data point by comparing each data point to road geometry. The data point can also be compared to statistics formed from aggregated data. In an embodiment, the snapping algorithm is implemented at an ingress server to provide, inter alia, advantages insubstantially real-time, low latency feeds. In an embodiment, the snapping algorithm can also be provided at the Stream Processing server system 200, Egress Server system 400, or Analytics Server system 500. In an embodiment, the system 10 can be further configured to map the event data to a map database as described herein.


In an embodiment, a base map is given as a collection of line segments. The system 10 can be configured to include a base map given as a collection of line segments for road segment, for example employing an R-Tree index as described herein. As disclosed herein, the system 10 includes, for each line segment, geometrical information regarding the line segment's relation to its nearest neighbors. For each line segment, statistical information regarding expected traffic volumes and speeds is generated from an initial iteration of the process. Vehicle movement event data comprises longitude, latitude, heading, speed, and time-of-day. As described herein, vehicle movement event data is geohashed, for example to a 6 character geohash. Vehicle movement data enriched with the geohash can be map-matched to the base map.


One exemplary advantage of the system 10 is that among large data set of vehicle movement data, the system can be configured to be highly selective and yet correct map interfaces at a high degree of resolution. For example, the system 10 can identify and correct map data and interfaces from at least and as many as 10 million geohashes in the United States.


Another exemplary advantage is map interfaces and navigation systems can be improved to accurately navigate vehicles.


In another embodiment, proceeding from the map matching enrichment described above, the Analytics Server 500 or Egress Server 400 can be configured to determine accurate road speeds from vehicle event movement data points. As shown in FIG. 9, at block 450, the system 10 is configured to generate road segments with unique segment IDs as described herein with respect to FIGS. 4A-4E and obtains lengths of the road segments. Through map matching, the system can be configured to analyze vehicle event data to locate each vehicle data point onto a road segment. Each point has associated with it a distance it has been moved in order to make the match. As explained above, roads are represented as a single line segment in the map, so a match distance can show the presence of lanes on a road. The vehicle event data points are thus processed through the map matching system to determine the identification of a segment of road. The data includes Segment ID, Segment Length, Journey ID, Timestamp and Speed.


As shown in FIG. 9, at block 452, for each segment of road and regular time period (e.g. 60 seconds of a day) the system 10 is configured to track and to calculate an average velocity for each vehicle through arithmetic mean of velocities reported in the vehicle event data. The system 10 obtains a Minute of Day, the Segment ID, the Segment Length, the Journey ID, and the Average Speed. Then, at block 454 the system 10 is configured to calculate a harmonic mean of the average vehicle velocities calculated with the arithmetic mean. The system 10 thus obtains the Minute of Day, the Segment ID, the Segment Length, a harmonic mean speed and a vehicle count. At block 456 the system 10 is configured to divide a length L of segment by the harmonic mean speed to obtain a transit time for the segment.


At block 458, the system 10 is configured to, for each segment ID and time period, to output: a calculated mean flow rate of traffic, a number of vehicles observed, and a transit time.


By summing estimated transit times over a sequence of road segments, for example as shown with respect to FIGS. 4B-4E, a value for total transit time can be given, which can be appropriate for use in generating estimated times of arrival at a destination.


By the use of a harmonic mean over pooled vehicle speeds, the system 10 advantageously ensures that the reported flow rate value tends to favor lower estimates. The system 10 is thus configured to be more responsive to sudden reductions in speed in observed vehicle flow and diminishes the effect of higher speed vehicles pulling the overall average up. It was found that in free flow traffic, where speed variance is low, the harmonic mean value approached the arithmetic mean, but as variance increases and traffic flow instability ensued, the harmonic mean value dropped accordingly. Accordingly, the system 10 is configured to provide accurate traffic notifications, as information on low speeds is more prescient than high speeds. Thus, the system 10 measurements are configured to underestimate the average, and thereby are more responsive and more accurate.


It was also found that the of a harmonic mean provided an improved result over usage of speed traps where instantaneous speed is captured, because instant capture data points failed to account for upstream and downstream changes in velocity until they are observed at the trap.


The system 10 thus advantageously can measure traffic flow accurately and frequently in order to both build up a dataset of historical flow rates for modeling and forecasting purposes, and also provide timely notifications of unexpected changes inflow rate (e.g. for mapping and traffic interfaces). Accordingly, the system 10 can be configured to provide the speed calculation as described with respect to FIG. 9 at the Egress Server system 400 (e.g., for third party 20 partner and/or downstream interfaces) or at the Analytics Server system 500 (e.g., for modeling and forecasting).



FIG. 6 is a logical architecture for a Portal Server system 600. In at least one embodiment, Portal Server system 600 can be one or more computers arranged to ingest and throughput records and event data. The Portal Server system 600 can be configured with a Portal User Interface 604 and API Gateway 606 for a Portal API 608 to interface and accept data from third party 15 users of the platform. In an embodiment, the Portal Server system 600 can be configured to provide daily static aggregates and is configured with search engine and access portals for real time access of data provided by the Analytics Server system 500. In at least one embodiment, Portal Server system 600 can be configured to provide a Dashboard to users, for example, to third party 15 client computers. In at least one embodiment, information from Analytics Server system 500 can flow to a report or interface generator provided by a Portal User interface 604. In at least one embodiment, a report or interface generator can be arranged to generate one or more reports based on the performance information. In at least one embodiment, reports can be determined and formatted based on one or more report templates.


The low latency provides a super-fast connection delivering information from vehicle source to end-user customer. Further data capture has a high capture rate of 3 seconds per data point, capturing up to, for example, 330 billion data points per month. As described herein, data is precise to lane-level with location data and 95% accurate to within a 3-meter radius, the size of a typical car.



FIG. 7 is a flow chart showing a data pipeline of data processing as described above. As shown in FIG. 7, in an embodiment, event data passes data through a seven (7) stage pipeline of data quality checks. In addition, data processes are carried out employing both stream processing and batch processing. Streaming operates on a record at a time and does not hold context of any previous records for a trip, and can be employed for checks carried out at the Attribute and record level. Batch processing can take a more complete view of the data and can encompass the full end-to-end process. Batch processing undertakes the same checks as streaming plus checks that are carried out across multiple records and Journeys.


In at least one embodiment, a dashboard display can render a display of the information produced by the other components of the system 10. In at least one embodiment, dashboard display can be presented on a client computer accessed over network. In at least one embodiment, user interfaces can be employed without departing from the spirit and/or scope of the claimed subject matter. Such user interfaces can have any number of user interface elements, which can be arranged in various ways. In some embodiments, user interfaces can be generated using web pages, mobile applications, GIS visualization tools, mapping interfaces, emails, file servers, PDF documents, text messages, or the like. In at least one embodiment, Ingress Server system 100, Stream Processing Server system 200, Egress Server system 400, Analytics Server system 500, or Portal Server system 600 can include processes and/or API's for generating user interfaces.


For example, as shown in the flow chart 800 of FIG. 8, feed data can be combined into an aggregated data set and visualized using an interface 802, for example a GIS visualization tool (e.g.: Mapbox, CARTO, ArcGIS, or Google Maps API) or other interfaces. In an embodiment, the system configured to provide connected vehicle (CV) insights and traffic products interfaces 802 therefor is described with respect to exemplary data processing of CV event data and segment event as described herein. An interface can also be configured to output data via interfaces to downstream devices such as traffic management devices, for example, via the Egress Server or Portal Sever. As shown in FIG. 8, the data feeds can include exemplary feeds such as, for example data set 804, data set 806, and connected vehicle movement data or segment event data 806.


Embodiments described with respect to systems 10, 50, 100, 200, 400, 500, 600 , 700, 800 and 900 are described in conjunction with FIGS. 1A-9, can be implemented by and/or executed on a single network computer. In other embodiments, these processes or portions of these processes can be implemented by and/or executed on a plurality of network computers. Likewise, in at least one embodiment, processes described with respect to systems 10, 50, 100, 200, 400, 500, 600, 700, 800, 900 or portions thereof, can be operative on one or more various combinations of network computers, client computers, virtual machines, or the like can be utilized. Further, in at least one embodiment, the processes described in conjunction with FIGS. 1A-9 can be operative in system with logical architectures such as those also described in conjunction with FIGS. 1A-9.


It will be understood that each block of the flowchart illustration, and combinations of blocks in the flowchart illustration, can be implemented by computer program instructions. These program instructions can be provided to a processor to produce a machine, such that the instructions, which execute on the processor, create means for implementing the actions specified in the flowchart block or blocks. The computer program instructions can be executed by a processor to cause a series of operational steps to be performed by the processor to produce a computer-implemented process such that the instructions, which execute on the processor to provide steps for implementing the actions specified in the flowchart block or blocks. The computer program instructions can also cause at least some of the operational steps shown in the blocks of the flowchart to be performed in parallel. Moreover, some of the steps can also be performed across more than one processor, such as might arise in a multi-processor computer system or even a group of multiple computer systems. In addition, one or more blocks or combinations of blocks in the flowchart illustration can also be performed concurrently with other blocks or combinations of blocks, or even in a different sequence than illustrated without departing from the scope or spirit of the disclosure.


Accordingly, blocks of the flowchart illustration support combinations for performing the specified actions, combinations of steps for performing the specified actions and program instruction means for performing the specified actions. It will also be understood that each block of the flowchart illustration, and combinations of blocks in the flowchart illustration, can be implemented by special purpose hardware-based systems, which perform the specified actions or steps, or combinations of special purpose hardware and computer instructions. The foregoing example should not be construed as limiting and/or exhaustive, but rather, an illustrative use case to show an implementation of at least one of the various embodiments.

Claims
  • 1. A system comprising a memory including program instructions and a processor configured to execute instructions for a method comprising: generating a road corridor comprising at least three consecutive segments;ingesting vehicle event data;tracking, with the vehicle event data, a vehicle through one or more of the consecutive segments of the road corridor;generating, for each of the one or more consecutive segments traversed by the vehicle, a segment event record comprising vehicle movement data derived from the vehicle event data; anddeleting the vehicle event data after the segment event record is generated.
  • 2. The system of claim 1, wherein the processor is configured to execute instructions for the method of generating the segment event record comprising: a) identifying, from the vehicle event data, a qualifying data point for vehicle that has entered a first road segment;b) identifying a traversal start data point in a second consecutive road segment;c) tracking a plurality of data points in the second segment;d) identifying the first data point in a third consecutive road segment as a segment event calculation trigger data point for the second road segment; ande) generating the segment event record for the second road segment based on the plurality of data points from the second segment.
  • 3. The system of claim 2, wherein the processor is configured to execute instructions for the method further comprising: repeating steps (a)-(e) for each of one or more subsequent road segments of the road corridor, where the segment event calculation trigger data point for a prior road segment acts as a qualifying data point for the subsequent road segment.
  • 4. The system of claim 3, wherein the vehicle movement data of the segment event record comprises speed data for the vehicle.
  • 5. The system of claim 4, wherein the processor is configured to execute instructions for the method further comprising: incrementing a speeding count for every data point where the vehicle event data shows the vehicle has gone above a speed threshold.
  • 6. The system of claim 2, wherein the vehicle movement data of the segment event record comprises a traversal time for the vehicle.
  • 7. The system of claim 2, wherein the processor is configured to execute instructions for the method further comprising: calculating a traversal time through the segment for the segment event record.
  • 8. The system of claim 5, wherein calculating the traversal time comprises subtracting a captured time stamp of the traversal start data point from a captured time stamp of the calculation triggering data point.
  • 9. The system of claim 1, wherein generating the segment event record comprises: calculating an average speed for the vehicle through the segment for the segment event record.
  • 10. The system of claim 9, wherein calculating the average speed comprises obtaining a traversal time and dividing a segment distance by the traversal time.
  • 11. The system of claim 2, wherein the system is configured to stop tracking the vehicle event data for a vehicle when an exception criterion is met.
  • 12. The system of claim 11, where the exception criterion comprises an exception criterion selected from the group of: a predetermined amount of time in which the system has not received vehicle event data for the tracked vehicle;a tracked vehicle returns to a previous segment;a vehicle engine on/off event.
  • 13. The system of claim 1, wherein the system is configured to: generate the segment event with an egress server; andoutput the generated segment event record via an egress interface of the egress server.
  • 14. A system comprising a memory including program instructions and a processor configured to execute instructions for a method, the method comprising: ingesting location event data to a server; andprocessing the location event data at the server to identify a road segment, wherein the processing comprises: identifying the road segment;tracking vehicle event data to locate a plurality of vehicle event data points for each of a plurality of vehicles in a road segment;calculating a velocity for each of the plurality of vehicles;calculating an average velocity for each vehicle through an arithmetic mean of the velocities of each of the plurality of vehicles through the road segment;calculating a harmonic mean speed of the average vehicle velocities and a vehicle count for the road segment;dividing a length L of segment by the harmonic mean speed to obtain a transit time for the road segment; andoutputting the transit time for the segment to a downstream interface.
  • 15. The system of claim 14, wherein the server performing the processing is an ingress server, an egress server, an analytics server, or a combination thereof.
  • 16. A computer implemented method for a computer comprising a memory including program instructions and a processor configured to execute instructions for the method comprising: generating a road corridor comprising at least three consecutive segments;ingesting vehicle event data;tracking, with the vehicle event data, a vehicle through one or more of the consecutive segments of the road corridor;generating, for each of the one or more consecutive segments traversed by the vehicle, a segment event record comprising vehicle movement data derived from the vehicle event data; anddeleting the vehicle event data after the segment event record is generated.
  • 17. The method of claim 16, wherein the processor is configured to execute instructions for the method of generating the segment event record comprising: a) identifying, from the vehicle event data, a qualifying data point for vehicle that has entered a first road segment;b) identifying a traversal start data point in a second consecutive road segment;c) tracking a plurality of data points in the second segment;d) identifying the first data point in a third consecutive road segment as a segment event calculation trigger data point for the second road segment; ande) generating the segment event record for the second road segment based on the plurality of data points from the second segment.
  • 18. The method of claim 17, wherein the processor is configured to execute instructions for the method further comprising: repeating steps a)-e) for each of one or more subsequent road segments of the road corridor, where the segment event calculation trigger data point for a prior road segment acts as a qualifying data point for the subsequent road segment.
  • 19. The method of claim 18, wherein the vehicle movement data of the segment event record comprises speed data for the vehicle.
  • 20. The method of claim 19, wherein the processor is configured to execute instructions for the method further comprising: incrementing a speeding count for every data point where the vehicle event data shows the vehicle has gone above a speed threshold.
  • 21. The method of claim 17, wherein the processor is configured to execute instructions for the method further comprising: calculating a traversal time through the segment for the segment event record.
  • 23. The method of claim 21, wherein calculating the traversal time comprises subtracting a captured time stamp of the traversal start data point from a captured time stamp of the calculation triggering data point.
  • 24. The method of claim 16, wherein generating the segment event record comprises: calculating an average speed for the vehicle through the segment for the segment event record.
  • 22. The method of claim 24, wherein calculating the average speed comprises obtaining a traversal time and dividing a segment distance by the traversal time.
  • 23. The method of claim 17, wherein the processor is configured to execute instructions for the method further comprising: stopping tracking the vehicle event data for a vehicle when an exception criterion is met.
  • 24. The method of claim 23, where the exception criterion comprises an exception criterion selected from the group of: a predetermined amount time in which the system has not received vehicle event data for the tracked vehicle;a tracked vehicle returns to a previous segment;a vehicle engine on/off event.
  • 25. The method of claim 16, wherein the processor is configured to execute instructions for the method further comprising: generating segment event with an egress server; andoutputting the generated segment event record via an egress interface of the egress server.
  • 26. A computer implemented method for a computer comprising a memory including program instructions and a processor configured to execute instructions for the method comprising: ingesting location event data to a server; andprocessing the location event data at the server to identify a road segment, wherein the processing comprises: identifying the road segment;tracking vehicle event data to locate a plurality of vehicle event data points for each of a plurality of vehicles in a road segment;calculating a velocity for each of the plurality of vehicles;calculating an average velocity for each vehicle through an arithmetic mean of the velocities of each of the plurality of vehicles through the road segment;calculating a harmonic mean speed of the average vehicle velocities and a vehicle count for the road segment;dividing a length L of segment by the harmonic mean speed to obtain a transit time for the road segment; andoutputting the transit time for the segment to a downstream interface.
  • 27. The method of claim 26, further comprising: performing the processing with an ingress server, an egress server, an analytics server, or a combination thereof.
CROSS REFERENCE TO RELATED APPLICATIONS

The present application claims priority to the following U.S. provisional patent applications, the entirety of each of which is incorporated by reference herein: U.S. Prov. Pat. App. No. 62/928,810 filed on Oct. 31, 2019; and U.S. Prov. Pat. App. 63/000,927 filed on Mar. 27, 2020.

Provisional Applications (2)
Number Date Country
62928810 Oct 2019 US
63000927 Mar 2020 US